Speech Corpora, Feature Extraction Techniques and Classifiers with Special Reference to Automatic Speech Recognition
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.372-378, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.372378
Abstract
in the current years, speech recognition has emerged as an important research area. To carry out further research on automatic speech recognition, a comprehensive review of existing work in this domain stands useful and constructive for the researchers. This paper has presented a recent literature review on speech recognition considering various existing speech corpora, speech features and different models or classifiers used in speech recognition. Different speech databases have been compared in terms of the number of speakers, type of speakers such as native or acted, age and gender of speakers and speech recording environment. Various techniques for speech signal acquisition and pre-processing of the speech signals are also addressed in this work.
Key-Words / Index Term
Automatic speech recognition, boundary detection, Feature-extraction, classifier, Mel-Frequency coefficient, phonemes, Speech Filter
References
[1] Mohamed, Abdel-Rahman, George Dahl, and Geoffrey Hinton. "Deep belief networks for phone recognition." Nips workshop on deep learning for speech recognition and related applications. Vol. 1. No. 9. 2009.
[2] Graves, Alex, Abdel-rahman Mohamed, and Geoffrey Hinton. "Speech recognition with deep recurrent neural networks." In Acoustics, speech and signal processing (icassp), 2013 ieee international conference on, pp. 6645-6649. IEEE, 2013.
[3] Hinton, Geoffrey, Li Deng, Dong Yu, George E. Dahl, Abdel-rahman Mohamed, Navdeep Jaitly, Andrew Senior et al. "Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups." IEEE Signal processing magazine 29, no. 6 (2012): 82-97.
[4] Cooke, Martin, et al. "An audio-visual corpus for speech perception and automatic speech recognition." The Journal of the Acoustical Society of America 120.5 (2006): 2421-2424.
[5] Yu, Dong, Li Deng, and George Dahl. "Roles of pre-training and fine-tuning in context-dependent DBN-HMMs for real-world speech recognition." In Proc. NIPS Workshop on Deep Learning and Unsupervised Feature Learning. 2010.
[6] Mari, J-F., J-P. Haton, and Abdelaziz Kriouile. "Automatic word recognition based on second-order hidden Markov models." IEEE Transactions on speech and Audio Processing 5, no. 1 (1997): 22-25.
[7] Rabiner, L. R., and J. G. Wilpon. "Some performance benchmarks for isolated word speech recognition systems." Computer Speech & Language 2.3-4 (1987): 343-357.
[8] Utpal Bhattacharjee, "A comparative study of LPCC and MFCC features for the recognition of Assamese phonemes." International Journal of Engineering Research and Technology2,
[9] Wilpon and Jay G., "Automatic recognition of keywords in unconstrained speech using hidden Markov models." In IEEE Transactions on Acoustics, Speech, and Signal Processing38.11 (1990): 1870-1878.
[10] Rabiner, L. R., S. E. Levinson, and M. M. Sondhi. "On the use of hidden Markov models for speaker-independent recognition of isolated words from a medium-size vocabulary." AT&T Bell Laboratories Technical Journal 63.4 (1984): 627-642.
[11] Dahl and George E., "Context-dependent pre-trained deep neural networks for large-vocabulary speech recognition." IEEE Transactions on audio, speech, and language processing 20.1 (2012): 30-42.
[12] S. F. Boll, "Suppression of Acoustic Noise in Speech Using Spectral Subtraction," IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. ASSP-27, no. 2, pp. 113–120, 1979.
[13] M. Karam, H. F. Khazaal, H. Aglan and C. Cole, “Noise removal in speech processing using spectral subtraction”, Journal of Signal and Information Processing, 2014.
[14] A. Agarwal and Y. M. Cheng, “Two-stage Mel-warped Wiener filter for robust speech recognition”, In Proc. ASRU, vol. 99, pp. 67-70, 1999.
[15] G. R. Babu and R. Rao, “Modified Kalman Filter-based Approach in Comparison with Traditional Speech Enhancement Algorithms from Adverse Noisy Environments”, International Journal on Computer Science and Engineering, vol. 3, no. 2, pp. 744-759, 2011.
[16] S.Gogoi and U. Bhattacharjee, “Vocal tract length normalization and sub-band spectral subtraction based robust Assamese vowel recognition system,” In IEEE International Conference on Computing Methodologies and Communication (ICCMC), IEEE, pp. 32-35, 2017.
[17] D. Giuliani, M. Gerosa, and F. Brugnara, "Improved automatic speech recognition through speaker normalization," Computer Speech & Language, vol. 20, no. 1, pp. 107–123, 2006.
[18] L. Lee and R. C. Rose, "Speaker normalization using efficient frequency warping procedures," in IEEE International Conference on Acoustics, Speech, and Signal Processing, IEEE, vol. 1, 1996.
[19] J. Lung et al., "Implementation of Vocal Tract Length Normalization for Phoneme Recognition on TIMIT Speech Corpus," in International Conference on Information Communication and Management, Singapore: IPCSIT, pp. 136–140, 2011.
[20] B . Widmer, "Implementation of Vocal Tract Length Normalization A Study of Methods". [Online]. Available: http : // ssli.ee.washington.edu / people / bwidmer /VTL_Talk/VTL_Talk.PDF. Accessed: 2013.
[21] S. Gogoi and U. Bhattacharjee, "Impact of Vocal Tract Length Normalization on the Speech Recognition Performance of an English Vowel Phoneme Recognizer for the Recognition of Children Voices," International Journal of Computer Trends and Technology (IJCTT), vol. 39, no. 2, pp. 105–109, 2016. [Online]. Available: http://www.ijcttjournal.org/2016/Volume39/number-2/IJCTT-V39P118.pdf. Accessed: Oct. 1, 2016.
[22] G. Garau, S. Renals, and T. Hain, "Applying Vocal Tract Length Normalization to Meeting Recordings," 2005. [Online]. Available: http://www.cstr.ed.ac.uk/downloads/ publications/2005/giuliagarau_eurospeech05.pdf.
[23] H. Jiang, K. Hirose and Q. Hue, “A minimax search algorithm for robust continuous speech recognition,” IEEE Transactions on Speech and Audio Processing, 8(6): 688–694, 2000.
[24] B. Nasersharif and A. Akbari, “Improved HMM entropy for robust sub-band speech recognition,” in13th European In Signal Processing Conference, IEEE, pp. 1–4, 2005.
[25] H. Xu, et al. , “Noise Condition-Dependent Training Based on Noise Classification and SNR Estimation,” IEEE Transactions on Audio, Speech, and Language Processing, 15(8): 2431–2443, 2007.
[26] O. Kalinli, et al., “Noise adaptive training for robust automatic speech recognition,” IEEE Transactions on Audio, Speech, and Language Processing, 18(8): 1889–1901, 2010.
[27] J. Ganitkevitch, “Speaker adaptation using maximum likelihood linear regression,”: Rheinish-Westflesche Technische Hochschule Aachen, the course of Automatic Speech Recognition, www-i6. informatik. rwthaachen. : [Online]. Available: http://www.cs.jhu.edu/~juri/pdf/mllr-rwth-2005.pdf. , 2015.
[28] Muda, Lindasalwa, Mumtaj Begam, and Irraivan Elamvazuthi. "Voice recognition algorithms using mel frequency cepstral coefficient (MFCC) and dynamic time warping (DTW) techniques." arXiv preprint arXiv:1003.4083 (2010).
[29] Ghai, Wiqas, and Navdeep Singh. "Analysis of automatic speech recognition systems for indo-aryan languages: Punjabi a case study." Int J Soft Comput Eng 2.1 (2012): 379-385.
[30] Mousmita Sarma, and Kandarpa Kumar Sarma. "Segmentation and classification of vowel phonemes of assamese speech using a hybrid neural framework." Applied Computational Intelligence and Soft Computing 2012, 2012.sd
[31] Kwon, Oh-Wook, Kwokleung Chan, and Te-Won Lee. Speech feature analysis using variational Bayesian PCA. IEEE Signal Processing Letters 10, no. 5. 2003, pp.137-140.
[32] Mousmita Sarma, Krishna Dutta, and Kandarpa Kumar Sarma. "Speech corpus of assamese numerals extracted using an adaptive pre-emphasis filter for speech recognition." In Computer and Communication Technology (ICCCT), 2010 International Conference on, IEEE, 2010, pp. 461-466.
[33] Mousmita Sarma, Krishna Dutta, and Kandarpa Kumar Sarma. "Speech corpus of assamese numerals extracted using an adaptive pre-emphasis filter for speech recognition." In Computer and Communication Technology (ICCCT), 2010 International Conference on, IEEE, 2010, pp. 461-466.
[34] Mohammadi, Seyed Hamidreza, and Alexander Kain. "Voice conversion using deep neural networks with speaker-independent pre-training." In Spoken Language Technology Workshop (SLT),IEEE, 2014, pp.19-23.
[35] Hasegawa-Johnson, Mark, Jon Gunderson, Adrienne Perlman, and Thomas Huang. "HMM-based and SVM-based recognition of the speech of talkers with spastic dysarthria." In Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. IEEE International Conference on, vol. 3, pp. III-III. IEEE, 2006.
[36] Morgan, Nelson, and Herve Bourlard. "Continuous speech recognition using multilayer perceptrons with hidden Markov models." Acoustics, Speech, and Signal Processing, 1990. ICASSP-90., 1990 International Conference on. IEEE, 1990.
[37] Renals and Steve, "Connectionist probability estimators in HMM speech recognition." IEEE Transactions on Speech and Audio Processing 2.1 (1994): 161-174.
[38] Robinson, A. J., Cook, G. D., Ellis, D. P., Fosler-Lussier, E., Renals, S. J., & Williams, D. A. G. Connectionist speech recognition of broadcast news. Speech Communication, 2002. Pp. 37(1-2), 27-45.
[39] Mohamed, Abdel-Rahman, George Dahl, and Geoffrey Hinton. "Deep belief networks for phone recognition." Nips workshop on deep learning for speech recognition and related applications. Vol. 1. No. 9. 2009.
[40] Mohamed, Abdel-Rahman, Dong Yu, and Li Deng. "Investigation of full-sequence training of deep belief networks for speech recognition." Eleventh Annual Conference of the International Speech Communication Association. 2010.
[41] Dahl, George, Abdel-Rahman Mohamed, and Geoffrey E. Hinton. "Phone recognition with the mean-covariance restricted Boltzmann machine." Advances in neural information processing systems. 2010.
[42] Mohamed, Abdel-Rahman, George E. Dahl, and Geoffrey Hinton. "Acoustic modeling using deep belief networks." IEEE Transactions on Audio, Speech, and Language Processing20.1 (2012): 14-22.
[43] Shaoqin, Yao, and Zhang Linghua. "Voice Conversion Based on Mixed GMM-ANN Model." Journal of Data Acquisition and Processing 2, 2014.
[44] Mridusmita Sharma, and Kandarpa Kumar Sarma. "Dialectal Assamese vowel speech detection using acoustic phonetic features, KNN and RNN." In Signal Processing and Integrated Networks (SPIN), 2015 2nd International Conference on, pp. 674-678. IEEE, 2015.
[45] Acero and Alex, "Live search for mobile: Web services by voice on the cell phone." Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. IEEE, 2008.
[46] Morgan and Nelson, "Pushing the envelope-aside [speech recognition]." IEEE Signal Processing Magazine 22.5 (2005): 81-88.
[47] Hwang, Mei-Yuh, and Xuedong Huang. "Shared-distribution hidden Markov models for speech recognition." IEEE Transactions on Speech and Audio Processing 1.4 (1993): 414-420.
[48] Rabiner and L. R., "Recognition of isolated digits using hidden Markov models with continuous mixture densities." Bell Labs Technical Journal 64.6 (1985): 1211-1234.
[49] Dahl, George, Abdel-Rahman Mohamed, and Geoffrey E. Hinton. "Phone recognition with the mean-covariance restricted Boltzmann machine." Advances in neural information processing systems. 2010.
[50] Hennebert and Jean, "Estimation of global posteriors and forward-backward training of hybrid HMM/ANN systems." (1997).
[51] Franzini M, Lee KF, Waibel A. Connectionist Viterbi training: a new hybrid method for continuous speech recognition. Acoustics, Speech, and Signal Processing, ICASSP-90., International Conference, IEEE, 1990, pp. 425-428.sd
[52] Levin E. Word recognition using hidden control neural architecture. InAcoustics, Speech, and Signal Processing, ICASSP-90., International Conference, IEEE, 1990, pp.433-436.
[53] Morgan, Nelson, and Herve Bourlard. Continuous speech recognition using multilayer perceptrons with hidden Markov models. In Acoustics, Speech, and Signal Processing, ICASSP-90.,International Conference, IEEE, 1990, pp.413-416.
[54] Niles, Les T., and Harvey F. Silverman. Combining hidden Markov model and neural network classifiers. In Acoustics, Speech, and Signal Processing, ICASSP-90., International Conference, IEEE, pp. 417-420.s
[55] Trentin, Edmondo, and Marco Gori. A survey of hybrid ANN/HMM models for automatic speech recognition. Neurocomputing 37, no. 1-4, 2001, pp. 91-126.
[56] Haffner P, Franzini M, Waibel A. Integrating time alignment and neural networks for high performance continuous speech recognition. InAcoustics, Speech, and Signal Processing, ICASSP-91., International Conference, IEEE, 1991, pp.105-108.
[57] Bengio, Yoshua, Renato De Mori, Giovanni Flammia, and Ralf Kompe. Global optimization of a neural network-hidden Markov model hybrid. IEEE transactions on Neural Networks3, no. 2, 1992, pp.252-259.
[58] Lang, K. J. The development of the time-delay neural network architecture for speech recognition. Technical Report CMU-CS, 1988, pp. 88-152.
[59] Mridusmita Sharma, Mousmita Sarma, and Kandarpa Kumar Sarma. "Recurrent Neural Network based approach to recognize assamese vowels using experimentally derived acoustic-phonetic features." In Emerging Trends and Applications in Computer Science (ICETACS), 2013 1st International Conference on,. IEEE, 2013, pp. 140-143.
[60] Patgiri, Chayashree, Mousmita Sarma, and Kandarpa Kumar Sarma. "Recurrent neural network based approach to recognize assamese fricatives using experimentally derived acoustic-phonetic features." In Emerging Trends and Applications in Computer Science (ICETACS), IEEE, 2013, pp. 33-37.
[61] Lippmann, R., Speech recognition by machines and humans. Speech Communication 22 (1), 1997. PP. 1–15.
[62] Van Leeuwen, D.A., van den Berg, L.G., Steeneken, H.J.M. Human benchmarks for speaker independent large vocabulary recognition performance. In: Proceedings of Euro speech, Madrid, Spain, 1995 pp. 1461– 1464
[63] Meyer, B., Wesker, T., Brand, T., Mertins, A., Kollmeier, B. A human–machine comparison in speech recognition based on a logatome corpus. In: Proceedings of the Workshop on Speech Recognition and Intrinsic Variation, Toulouse, France, 2006.
[64] Sroka, J.J., Braida, L.D. Human and machine consonant recognition. Speech Communication 45, 2005. pp. 401–423.
[65] Moore, R.K. There’s no data like more data: but when will enough be enough? In: Proceedings of the Acoustics Workshop on Innovations in Speech Processing, vol. 23 (3), Stratford-upon-Avon, UK, 2001. pp. 19– 26.
[66] Moore, R.K. A comparison of the data requirements of automatic speech recognition systems and human listeners. In: Proceedings of Euro speech, Geneva, Switzerland, 2003, pp. 2581–2584.
[67] Cooke, M. A glimpsing model of speech recognition in noise. Journal of the Acoustical Society of America 119 (3), 2006. pp. 1562–1573.
[68] Cutler, A., Robinson, T. Response time as a metric for comparison of speech recognition by humans and machines. In J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, Conference of the International Speech Communication Association. 2010, pp.68–73.
[69] Sujatha N. and Prakash K. An Efficient and Scalable Auto Recommender System Based on Users Behavior in Isroset-Journal (IJSRCSE) Vol.6 , Issue.6 , pp.35-40, Dec-2018.
[70] Mutkule Prasad R, Interactive Clothing based on IoT using QR code and Mobile Application Journal (IJSRNSC) , Vol.6 , Issue.6 , pp.1-4, Dec-2018.
Citation
D. Dutta, R.D.Choudhury, S.Gogoi, "Speech Corpora, Feature Extraction Techniques and Classifiers with Special Reference to Automatic Speech Recognition," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.372-378, 2019.
A Review Paper on Pothole Detection Methods
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.379-383, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.379383
Abstract
The growth of a country depends on the transportation services for traveling safely. Many distresses of asphalt pavements are responsible for the unsafe pavement surface. Potholes are the main reason for the distress of pavement. For detecting and repairing asphalt pavement having potholes, many methods are proposed in the literature for detecting potholes. There are many reasons for the distress of pavement surfaces like heavyweights of vehicles, an unspecified amount of materials, and environmental changes. In this paper, different methods are surveyed like vibration-based method, 3D Reconstruction, and vision-based method for detecting potholes. The vibration-based methods use an accelerometer, 3D laser method uses laser sensor, and vision-based method uses different image processing techniques for detecting potholes. 3D Reconstruction includes 3D laser method, Stereo Vision method, and Kinect Sensor method. The Vision-based method includes a 2D image-based method and Video-based method. In this review paper, the advantages and disadvantages of various methods are also discussed.
Key-Words / Index Term
Potholes, Vibration-based method, Vision-based method, Stereo vision method, Image processing
References
[1] A. Akagic, E. Buza, S. Omanovic “Pothole Detection: An Efficient Vision Based Method Using RGB Color Space Image Segmentation”, In the proceeding of the 2017 IEEE conference on MIPRO, pp. 1104-1109, 2017.
[2] K. D. Zoysa, C. Keppitiyagama, G. P. Seneviratne, and W.W.A.T. Shihan, “A public transport system based sensor network for road surface condition monitoring”, In the proceedings of workshop on Networked Systems for Developing Regions, pp. 1-6,2007.
[3] D. Jang, R. Park, “Pothole detection using spatio-temporal saliency”, IET Intelligent Transport Systems, pp. 605-612,2016.
[4] A. Mednis, G. Strazdins, R. Zviedris, G. Kanonirs, and L. Selavo, “Real time pothole detection using Android smartphones with accelerometers”, In the proceedings of the International Conference on Distributed Computing in Sensor Systems and Workshops, pp. 1-6,2001.
[5] A. S. Rao, J. Gubbi, M. Palaniswami and E. Wong, “A Vision-Based System to Detect Potholes and Uneven Surfaces for Assisting Blind People”, IEEE ICC 2016 SAC E-Health, 2016.
[6] K. C. P. Wang, “Challenges and feasibility for comprehensive automated survey of pavement conditions”, In the proceeding of 8th International Conference on Applications of Advanced Technologies in Transportation Engineering, pp. 531-536, 2004.
[7] A. Danti, J. Y. Kulkarni, and P. S. Hiremath, “An Image Processing Approach to Detect Lanes, Pot Holes and Recognize Road Signs in Indian Roads”, International Journal of Modeling and Optimization, Vol. 2, No. 6, pp. 658-662, December 2012.
[8] C. Koch, and I. Brilakis, “Pothole detection in asphalt pavement images”, Advanced Engineering Informatics, Vol. 25, pp. 507-515, 2011.
[9] N. Kumbhar, D. Mhetre, A. Mujawar, S.T.Khot, “POTHOLE DETECTION USING IMAGE PROCESSING”, International Journal For Technological Research In Engineering, Vol. 3, Issue. 9, pp. 1887-1889, May-2016.
[10] Z. Zhang, X. Ai, C. K. Chan and N. Dahnoun, “AN EFFICIENT ALGORITHM FOR POTHOLE DETECTION USING STEREO VISION”, IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP), pp. 564-568, 2014.
[11] E. Salari, E. Chou, and J. J. Lynch, “Pavement distress evaluation using 3d depth information from stereo vision”, Tech. Rep., 2012.
[12] B. X. Yu, and X. Yu, “Vibration-based system for pavement condition evaluation”, In proceeding of the 9th International conference on Applications of Advanced Technology in Transportation, pp. 183-189, 2006.
[13] K.T. Chang, J. R. Chang, and J. K. Liu, “Detection of pavement distress using 3D laser scanning technology, Conference on Computing in Civil Engineering, pp. 1-11, 2005.
[14] Q. Li, M. Yao, X. Yao, and B. Xu, “A real-time 3D scanning system for pavement distortion inspection”, Measurement Science and Technology, Vol. 21, No. 1, pp. 15702-15709, 2009.
[15] K. Azhar, F. Murtaza, M. H. Yousaf, H. A. Habib, “Computer Vision Based Detection and Localization of Potholes in Asphalt Pavement Images”, In proceeding of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2016.
[16] Buza, E. S. Omanovic, and A. Huseinnovic, “Stereo vision techniques in the road pavement evaluation”, on Information Technology and Computer Networks,, pp. 48-53, 2013.
[17] G. M. Jog, C. Koch, M. Golparvar-Fard, and I. Brilakis, “Pothole properties measurement through visual 2D recognition and 3D reconstruction”, In Proceedings of the ASCE International Conference on Computing in Civil Engineering, pp. 553-560, 2012.
[18] H. Lokeshwor, L. K. Das, and S. K. Sud, “Method for automated assessment of potholes, cracks and patches from road surface video clips”, Procedia – Social and Behavioral Sciences, Vol. 104, pp.312-321, 2013.
[19] Y. O. Ouma, M. Hahn, “Pothole detection on asphalt pavements from 2D-colour pothole images using fuzzy c-means clustering and morphological reconstruction”, ELSEVIER, pp. 196-211,2017.
[20] C. Koch, G. M. Jog, and I. Brilakis, “Pothole detection with image processing and spectral clustering, Journal of Computing in Civil Engineering, Vol. 27, No. 4, pp. 370-378, 2013.
[21] T. Kim, S. Ryu, “Review and Analysis of Pothole Detection Methods”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 5, No. 8, pp. 603-608, August 2014.
[22] A. Bhat, P. Narkar, D. Shetty, D. Vyas, “Detection of Potholes using Image Processing Techniques”, IOSRJEN, Vol. 2, pp. 52-56, March 2018.
[23] S. Ryu, T. Kim, and Y. Kim, “Image-Based Pothole Detection System for ITS Service and Road Management System”, Hindawi Publishing Corporation, Vol. 2015, pp. 1-10, April 2015.
Citation
Jetashri R. Gandhi, U. K. Jaliya, D. G. Thakore, "A Review Paper on Pothole Detection Methods," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.379-383, 2019.
A Review on EDM Techniques with Special Focus on Student Performance Enhancement
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.384-388, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.384388
Abstract
Today many of the institutions use data mining techniques, especially in the field of education. The main purpose of Educational Data Mining (EDM) is to increase the quality of education. Use of data mining methods in educational scenarios will help us to learn student behaviour, their performance, enhance the present student models and efficiently design the course curriculum. Teachers will get an overview into the academic performance and administrators can make policies, execute programmes, and adapt the policies and programmes to enhance the teaching–learning process. Using EDM we can improve student’s achievements and success more efficiently and effectively. Machine Learning methods are very efficient for predicting student performance. The student data depends on the various educational environments. Selection of the correct dataset plays a vital role in these predictions. EDM uses computational approaches to analyze educational problems and data. By applying data mining techniques we can extract valuable information from huge amounts of data. For extracting knowledge from huge volume of data we require sophisticated set of algorithms and data pre-processing techniques. This paper surveys the most relevant studies carried out in the field of student performance enhancement. It also discusses EDM, areas of student performance enhancements and enhancement methods based on classification.
Key-Words / Index Term
Educational Data Mining, Classification, Knowledge Discovery, Machine Learning, Prediction
References
[1] Guo, Bo, et al. “Predicting students’ performance in educationa Data Mining”, Educational Technology (ISET 2015), International Symposium on IEEE, 2015.
[2] Baker, R.S.J.d, “Data mining for education”, In: McGaw, B., Peterson, P., Baker, E. (eds.) International Encyclopedia of Education, vol. 7, 3rd Edn. pp. 112-118. Elsevier Amsterdam 2010.
[3] Romero, Cristobal, Sebastian Ventura, “Data mining in education”, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 3.1, 12–27, 2013.
[4] Leena Khanna, Dr. Shailendra Narayan Singh, Dr. Mansaf Alam, “Educational Data Mining and its Role in Determining Factors Affecting Students Academic Performance: A Systematic Review”, Information Processing (IICIP), I st India International Conference On IEEE, 2016.
[5] Alom, B.M., Matthew Courtney, “Educational Data Mining: Case Study Perspectives from Primary to University Education in Australia”, 2018.
[6] Romero, Cristobal, Sebastian Ventura, “Educational data mining: a Review of the state of the art”, IEEE Transactions on Systems, Man, And Cybernetics, Part C (Applications and Reviews) 40.6: 601-618, 2010.
[7] Agaoglu, Mustafa, “Predicting Instructor Performance Using Data Mining Techniques in Higher Education”, IEEE Access 4:2379-2387, 2016.
[8] Kaur, Amanpreet, Amanpreet kaur Batth, “Predicting Instructors Performance using Data Mining Techniques”, International Journal of Engineering Science 12835, 2017.
[9] Jacob John, et al. “Educational Data Mining techniques and their Application”, Green Computing and Internet of Things (ICGCIoT), International Conference on IEEE, 2015.
[10] Han, J., Kamber, M., Pei, J., “Data Mining: Concepts And Techniques”, 3rd edn. Elsevier, Oxford, 2011.
[11] Shahiri, Amirah Mohamed, and Wahidah Husain, “A review on Predicting Students Performance using data mining techniques”, Procedia Computer Science 72: 414- 422, 2015.
[12] Walte, Dipesh, et al. “Overview of algorithm in Educational Data Mining for Higher Education: An Application Perspective”, International Journal of Engineering Research & Technology 3.2, 2014.
[13] Kawchale, Neha, “Prediction of Student Performance in Higher Education System using R Programming”, 2017.
[14] R. Hecht-Nielsen, “Theory of the back propagation neural Network”, In Proceedings of the International Joint Conference on Neural Networks (IJCNN), volume 1, pp. 593–605. IEEE, Washington, DC, 1989.
[15] V.N. Vapnik, “Statistical Learning Theory”, John Wiley & Sons, New York, 1998.
[16]Abazeed, Ashraf, and Moaiad Khder, “A Classification and Prediction Model for Student’s Performance in University Level”, 2017.
[17] Zollanvari, A., Kizilirmak, R.C., Kho, Y.H. and Hernández - Torrano, D., “Predicting students’ GPA and developing intervention Strategies based on self-regulatory learning behaviors”, IEEE Access, 5, pp.23792-23802, 2017.
[18] Nieto, Y., García-Díaz, V., Montenegro, C. and Crespo, R.G., “Supporting academic decision making at higher educational institutions using machine learning-based algorithms”, Soft Computing, pp.1-9, 2018.
[19] JieXu, Kyeong Ho Moon, Mihaela Van Der Schaar, “A Machine Learning Approach for Tracking and Predicting Student Performance in Degree Programs”, IEEE Journal of Selected Topics in Signal Processing 11.5: 742-753, 2017.
[20] Altujjar, Yasmeen, et al. “Predicting Critical Courses Affecting Students Performance: A Case Study”, Procedia Computer Science 82: 657, 2016.
[21] Mueen, Ahmed, Bassam Zafar, and Umar Manzoor, “Modeling and Predicting Students’ Academic Performance Using Data Mining Techniques, International Journal of Modern Education and Computer Science 8.11: 36, 2016.
[22]Guruler, Huseyin, Ayhan Istanbullu, “Modeling Student Performance in Higher Education using Data Mining”, Educational Data Mining. Springer, Cham, 105-124, 2014.
[23]Bhardwaj, Brijesh Kumar, Saurabh Pal, “Data Mining: A Prediction for Performance Improvement using Classification”, ArXiv Preprint arXiv: 1201.3418, 2012.
[24] Asif, R., Merceron, A., Ali, S.A., Haider, N.G, “Analyzing Undergraduate students` performance using educational data Mining”, Computers & Education, 113, pp.177-194, 2017.
Citation
Simmi John, Anuj Mohamed, "A Review on EDM Techniques with Special Focus on Student Performance Enhancement," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.384-388, 2019.
Application of KNN Classification Technique in Detection of Software Fault
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.389-393, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.389393
Abstract
The software engineering is the technology which is used to analyze software behavior SDP includes software metrics, their attributes like line of code etc. The main goal of software defects prediction model includes ordering new software modules based on their defect-proneness and classifying them whether it is new software or not. The main purpose of SDP for the ranking is to predict which modules have the most defects to define software quality enhancement. The goal of SDP for the ranking task is to predict the relative defect number, although estimating the precise number of defects of the modules is better than estimating the ranks of modules, because the precise number of defects can give more information than the ranks. The software defect prediction technique is applied in the previous work based on the technique of ANN. In this research work the technique of KNN is applied for the software defect prediction. It is analyzed that proposed technique has high accuracy and less execution time as compared to existing ANN technique.
Key-Words / Index Term
Fault Prediction, KNN, Software Defect Prediction, NFR ,ANN
References
[1] Dang Viet Dezung, Atsushi Ohnishi Improvement of Quality of Software Requirements with Requirements Ontology”, International Conference on Quality Software, Jeju, pp 284- 289, 2009
[2] F. Shull, et al., How Perspective-Based Reading Can Improve Requirements Inspections, IEEE Computer, Vol. 33, No. 7, pp. 73-79, Jul.2000.
[3] C. Denger and T. Olsson, Quality Assurance in Requirements Engineering, in Engineering and Managing Software Requirements, A. Aurum and C. Wohlin, Eds. Springer, pp. 163-185, 2005
[4] J. G. Hall, M. Jackson, R. C. Laney, B. Nuseibeh, and L. Rapanotti, “Relating software requirements and architectures using problem frames,” in Proc.of the IEEE Joint International Conference on Requirements Engineering, 2002, pp. 137–144.
[5] P. Grnbacher, A. Egyed, and N. Medvidovic, “Reconciling software requirements and architectures: The cbsp approach,” in Fifth IEEE International Symposium on Requirements Engineering, 2001, pp. 202–211.
[6] M. Brandozzi and D. Perry, “Transforming goal oriented requirement specifications into architectural prescriptions,” in Proceedings of First International Workshop From Software Requirements to Architectures (STRAW01), 2001, pp. 54–61.
[7] Senay Tuna Demirel, Resul Das, “Software Requirement Analysis: Research Challenges and Technical Approaches”, IEEE, 2018
[8] Syed Waqas Ali, Qazi Arbab Ahmed, Imran Shafi, “Process to Enhance the Quality of Software Requirement Specification Document”, IEEE, 2018
[9] Ra´ul Navarro-Almanza, Reyes Ju´arez-Ram´ırez, Guillermo Licea, “Towards supporting Software Engineering using Deep Learning: A case of Software Requirements Classification”, 2017 5th International Conference in Software Engineering Research and Innovation
[10] Jorge Rafael Aguilar Cisneros, Genaro de la Rosa Garcia, Carlos Alberto Fernández-y-Fernández, “Software Requirement Specification for the Automotive Sector: The case of a Post-Collision Event Control System”, 2017 5th International Conference in Software Engineering Research and Innovation
[11] Stallin E. F. Silva, Mario L. Cˆortes, “Use of non-functional requirements in software effort estimation: systematic review and experimental results”, 2017 5th International Conference in Software Engineering Research and Innovation
[12] Navid Asadizanjani, Mark Tehranipoor, and Domenic Forte, “PCB Reverse Engineering Using Nondestructive X-ray Tomography and Advanced Image Processing”, 2017, IEEE TRANSACTIONS ON COMPONENTS, PACKAGING AND MANUFACTURING TECHNOLOGY
[13] Mrinal Singh Rawat, Sanjay Kumar Dubey , “Software Defect Prediction Models for Quality Improvement: A Literature Study”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, No 2, September 2012 ISSN (Online): 1694-0814
[14] Xiaoxing Yang, Ke Tang, Senior Member, IEEE, and Xin Yao, “A Learning-to-Rank Approach to Software Defect Prediction”, IEEE TRANSACTIONS ON RELIABILITY, VOL. 64, NO. 1, MARCH 2015
[15] B. Twala, “Software faults prediction using multiple classifiers,” in: 2011 3rd Int. Conf. Comput. Res. Dev., 4, 2011.
[16] L. Yu, “An evolutionary programming based asymmetric weighted least squares support vector machine ensemble learning methodology for software repository mining,” Inf. Sci. 191, 2012.
[17] L. Guo, Y. Ma, B. Cukic, H.S.H. Singh, “Robust prediction of faultproneness by random forests,” in: 15th Int. Symp. Softw. Reliab. Eng., 2004.
[18] A. Kaur, R. Malhotra, “Application of random forest for predicting fault prone classes,” in: International Conference on Advanced Computer Theory and Engineering, Thailand, December 20–22, 2008.
[19] T. Khoshgoftaar, E. Allen, “Model software quality with classification trees,” Recent Adv. Reliab. Qual. Eng., 2001.
[20] A. Bener, B. Turhan, “Analysis of Naive Bayes’ assumptions on software fault data: an empirical study,” Data Knowl. Eng. 68, 2009.
[21] K. Dejaeger, T. Verbraken, B. Baesens, “Prediction Models Using Bayesian Network Classifiers,” 39, 2013.
[22] A. Okutan, O.T. Yıldız, “Software defect prediction using Bayesian networks,” Empirical Softw. Eng., 2012.
[23] T. Khoshgaftaar, E.D. Allen, J.P. Hudepohl, S.J. Aud, “Application of neural networks to software quality modeling of a very large telecommunications system,” IEEE Trans. Neural Netw. 8 (4), 1997.
[24] A.T. Mısırlı, A.B. Bener, B. Turhan, “An industrial case study of classifier ensembles for locating software defects,” Softw. Qual. J. 19, 2011.
Citation
Ritika, Er. Saurabh Sharma, "Application of KNN Classification Technique in Detection of Software Fault," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.389-393, 2019.
An Overview of Honeypot Systems
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.394-397, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.394397
Abstract
In today’s world, network security is a very crucial issue. Providing security to the network, services is a major concern these days. Therefore, in this paper we study the concept of Honeypots. A Honeypot is a fake system which lures the attackers. The attackers give in to the temptation and launch attacks. Such attacks help the researchers and organization to study the attack patterns and gain vital information about the attackers. A honeypot is only meant to tantalize the intruders, attackers to perform the malicious activity which results in revealing information about attacks. Thereby, honeypots are quite useful in preventing and counter attacking various types of attacks. We can build Honeynet, Honeywalls using the concept of Honeypots. In this paper, we focus on the concept of Honeypot systems and represent the various aspects of honeypots. We also discuss the various types of honeypots along with its advantages and disadvantages. We also focus on the concepts of Honeynet and Honeywalls.
Key-Words / Index Term
Honeypot, Honeynet, Honeywalls, Intruders
References
[1] William Stallings “Cryptography and Network Security Principles and Practices” Prentice Hall Publication, pp. 581, 2005.
[2] Lance Spitnzer “Honeypots: Tracking Hackers” Addison Wisley Longman Publishing Co.in, 2002.
[3] Liu Dongxia, Zhang Yongbo, “An Intrusion Detection System Based on Honeypot Technology” , In the Proceedings of 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE2012), Hangzhou, pp. 451-454.
[4] Tao, Jing. Immune-based intrusion prevention model [J]. Network and Information, 200907
[5] Peng Hong, Wang Cong, Guan Xin “Intrusion Prevention System in the Network of Digital Mine” 2nd International Conference on Computer Engineering and Technology, Volume 6, pp. 296-299, 2010.
[6] M. Sqalli, R. AlShaikh, E. Ahmed “Towards Simulating a Virtual Distributed Honeynet at KFUPM: A Case Study” UKSim Fourth European Modeling Symposium on Computer Modelling and Simulation.pp. 316-321, 2010
[7] Ariel Bar, Bracha Shapira, Lior Rokach and Moshe Unger, “Identifying Attack Propagation Patterns in Honeypots using Markov Chains Modeling and Complex Networks Analysis” IEEE International Conference on Software Science, Technology and Engineering , pp. 28-36, 2016.
[8] Thesis on “Honeypots in Network Security” by Deniz Akkaya- Fabien Thalgott, School of Computer Science, Physics and Mathematics, Linnaeus University, 29th June 2010.
[9] Gérard Wagener. “Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour” Computer Science [cs]. Institut National Polytechnique de Lorraine - INPL, 2011. English.
[10] Jules Pagna Disso, Kevin Jones, Steven Bailey, “A Plausible Solution SCADA Security: Honeypot Systems”Eighth International Conference on Broadband, Wireless Computing, Communication and Applications,pp. 443-448, 2013.
[11] Mohammed H. Sqalli, Shoieb Arshad, Mohammad Khalaf, Khaled Salah, “Identifying Scanning Activities in Honeynet Data using Data Mining” Third International Conference on Computational Intelligence, Communication Systems and Networks, pp. 178-183, 2011.
[12] A. Mairh, et al., Honeypot in network security: a survey, In: Proceedings of the 2011 International Conference on Communication, Computing & Security. ACM, 2011. p. 600-605.
[13] L. Spitzner, Honeypots: Catching the insider threat, In: Computer Security Applications Conference 2003, Proceedings. 19th Annual. IEEE, 2003. p. 170-179, 2003
[14] Dissertation on “Deception Techniques Using Honeypots” by Amit D. Lakhani, Information Security Group Royal Holloway, University of London, UK.
[15] Keith Harrison, James R. Rutherford, and Gregory B. White “The Honey Community: Use of Combined Organizational Data for Community Protection” 48th Hawaii International Conference on System Sciences, pp. 2288-2297, 2015.
Citation
Neha Titarmare, Nayankumar Hargule, Anand Gupta, "An Overview of Honeypot Systems," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.394-397, 2019.
A Review on Solar Energy Harvesting Wireless Sensor Network
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.398-404, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.398404
Abstract
The finite energy of batteries associated with wireless sensor networks is a major constraint which limits its lifetime. One of the methods to overcome this major limitation is energy harvesting systems. Thither are many energy sources available nowadays, but solar energy is flexible, mature and external power source so it is broadly used for energy harvesting in WSN to enhance the life of the network used. This paper presented an overview of solar energy harvesting system and the impact of solar energy harvesting on Wireless Sensor Network. We have also propounded the various energy harvesting sources that are used for WSNs and energy harvesting process. This paper also describes the supercapacitor and various recharging batteries.
Key-Words / Index Term
Wireless sensor network (WSN), Energy Harvesting (EH), Solar energy harvesting (SEH)
References
[1] Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, Erdal Cayirci, “A Survey on sensor networks”, IEEE,(2002).
[2] Chun-Cheng Lin & Yung-Chiao Chen & Jiann-Liang Chen & Der-Jiunn Deng & Shang-Bin Wang & Shun-Yu Jhong, “Lifetime Enhancement of Dynamic Heterogeneous Wireless Sensor Networks with Energy-Harvesting Sensors”, Springer Science+Business Media New York 2017, DOI 10.1007/s11036-017-0861-6, (2017).
[3] Himanshu Sharma, Ahteshamul Haque, and Zainul A. Jaffery, “Solar energy harvesting wireless sensor network nodes: A survey”, Journal of Renewable and Sustainable Energy 10, 023704 (2018); DOI: 10.1063/1.5006619, (2018).
[4] Hafiz Husnain Raza Sherazi, LuigiAlfredo Grieco, Gennaro Boggia, “A comprehensive review on energy harvesting MAC protocols in WSNs: Challenges and tradeoffs”, Ad Hoc Networks 71 (2018) 117–134 (2018).
[5] Fayaz Akhtar, Mubashir Husain Rehmani, “Energy replenishment using renewable and traditional energy resources for sustainable wireless sensor networks: A review”, Renewable and Sustainable Energy Reviews45(2015)769–784,pp,1364-0321, (2015).
[6] Muhammad Iqbal, Farid Ullah Khan, “Hybrid vibration and wind energy harvesting using combined piezoelectric and electromagnetic conversion for bridge health monitoring applications”, Energy Conversion and Management 172(2018)611-618, pp0196-8904 (2018)
[7] Jiří Libich, Josef Máca, Jiří Vondrák, Ondřej Čech, Marie Sedlaříková, “Supercapacitors: Properties and applications”, Journal of Energy Storage17(2018)224-227, pp 2352-152X, (2018).
[8] Arpita Jaitawat, Arun Kumar Singh, “Battery and supercapacitor imperfections modeling and comparison for RF energy harvesting wireless sensor network”, Springer Science+Business Media, LLC, part of Springer Nature, https://doi.org/10.1007/s11276-018-1831-z (2018).
[9] Yin Li and Ronghua Shi, “An intelligent solar energy-harvesting system for wireless sensor networks”, EURASIP Journal on Wireless Communications and Networking, Springer, DOI 10.1186/s13638-015-0414-2, (2015).
[10] Dong Kun Noh, Junbeom Hur, “Using a dynamic backbone for efficient data delivery in solar-powered WSNs”, Journal of Network and Computer Applications 35 (2012) 1277–1284, (2012).
[11] Faisal Karim Shaikh, Sherali Zeadally,“Energy harvesting in wireless sensor networks: A comprehensive review”, Renewable and Sustainable Energy Reviews, DOI: 10.1016/j.rser.2015.11.010, (2015).
[12] Minami M, Morito T, Morikawa H, Aoyama T. ,“Solar biscuit: a battery-less wireless sensor network system for environmental monitoring applications”. In: Proceedings of the second international workshop on networked sensing systems, San Diego, USA; (2005).
[13] Simjee F, ChouPH. , “Everlast: long-life, super capacitor- operated wireless sensor node”.In: Proceedings of international symposium on low power electronics anddesign, Tegernsee,2006.p.197–202(2006).
[14] K. Lin, J. Yu, J. Hsu, S. Zahedi, D. Lee, J. Friedman, A. Kansal, V. Raghunathan, and M. Srivastava, “Heliomote:Enabling long-lived sensor networks through solar energy harvesting,” in Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems,(SenSys 2005) (ACM, New York, USA, 2005), pp. 309–309.(2005).
[15] Ahmad H. Dehwaha, Shahrazed Elmetennania, Christian Claudel,“UD-WCMA: An energy estimation and forecast scheme for solar powered wireless sensor networks”, Journal of Network and Computer Applications, DOI: 10.1016/j.jnca.2017.04.003(20) (2017).
[16] Dong Kun Noh, Kyungtae Kang, “Balanced energy allocation scheme for a solar-powered sensor system and its effects on network-wide performance”, Journal of Computer and System Sciences 77 (2011) 917–932 , DOI:10.1016/j.jcss.2010.08.008 , (2011).
[17] Mustapha Khiati, Djamel Djenouri,“ Adaptive learning-enforced broadcast policy for solar energy harvesting wireless sensor networks”, Computer networks, DOI:10.1016/j.comnet.2018.07.016 (2018) .
[18] Gwo-Jiun Horng , Tun-Yu Chang , Sheng-Tzong Cheng, “ An effective node-selection scheme for the energy efficiency of solar-powered WSNs in a stream environment”, Expert Systems with Applications41(2014)3143–3156, DOI:10.1016/j.eswa.2013.11.016 0957-4174 , (2013).
Citation
Harmandeep Kaur, Avtar Singh Buttar, "A Review on Solar Energy Harvesting Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.398-404, 2019.
Prediction of Train Delay in Indian Railways through Machine Learning Techniques
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.405-411, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.405411
Abstract
Train delay is one of the foremost problems in the railway systems across the world. According to the TOI newspaper, In India there are about 25.3 million people were used to travel by train in 2006 and this drastically increased year by year. In 2018, every day at least 80 million people in India prefer to travel by trains[1]. Categorically in India, most of the trains unable to run on their scheduled time due to poor signaling and less number of railway tracks. This implies that travellers might get delayed to reach their respective destinations. The aim of this paper is to present the prediction of Train delay in Indian Railways through machine learning techniques to achieve higher accuracy. In the proposed model, we used 3 different machine learning methods (Multivariate regression, Neural Network, and Random Forest) which have been compared with different settings to find the most accurate method. To compare different methods, we consider training time and accuracy of the method over the test data set. Trains in India get delayed frequently, and if we can predict this in advance - it would be a great help for the passengers to plan their journey according to their works.
Key-Words / Index Term
Train delay, Multivariate Regression, Neural Network, Random Forest
References
[1] Ministry of Railways, "Indian Railways year book 2015-16," in ministry of Railways (Railway Board) , 2015.
[2] Ministry of Railway. "Indian Railways Statistical Publications 2016-17: PassengerBusiness" p. 23. Archived (PDF) from the original on 3 March 2018. Retrieved: 2 March 2018
[3] Mathworks, "What is machine learning?", https://se.mathworks. com/discovery/ machine-learning.html Retrieved: 20 October 2018
[4] K. Jain, Anil & Mao, Jianchang & Moidin Mohiuddin, "Artificial Neural Networks: A Tutorial,” 29. 31 - 44. 10.1109/2.485891. (1996).
[5] James G, Witten D, Tibshirani T H R. "An introduction to Statistical Learning with Applications in R" .New York. Springer; 2013
[6] Lutz, Mark “Learning Python (5th ed.)”. O’’Reilly Media. ISBN 978-0-596-15806-4. (2013).
[8] Hansen, I.A. & Goverde, Rob & J. van der Meer, Dirk. “Online train delay recognition and running time prediction.” IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC. 1783 - 1788. 10.1109/ITSC.2010.5625081. (2010).
[9] Y. Masoud et al. “ Railway passenger train delay prediction via neural network model” JOURNAL OF ADVANCED TRANSPORTATION, 47:355–368, (2013)
[10] S. Pongnumkul et al. "Improving arrival time prediction of Thailand`s passenger trains using historical travel times," 11th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp. 307-312, 2014
[11] Jia Hu, Bernd Noche. “Application of Artificial Neuron Network in Analysis of Railway Delays”, Open Journal of Social Sciences, 4, 59-68, 2016
[12] R. Nilsson and K. Henning, “Predictions of train delays using machine learning,” Dissertation DIVA, 2018.
[13] L. Oneto et al. "Advanced Analytics for Train Delay Prediction Systems by Including Exogenous Weather Data," IEEE International Conference on Data Science and Advanced Analytics (DSAA), Montreal, QC, 2016, pp. 458-467. 2016
[14] R. Gaurav et al., “Estimating Train Delays in a Large Rail Network Using a Zero Shot Markov Model”, arXiv:1806.028251v1 [stat.AP], 7 June 2018
[15] Jasti Satyakrishna et al., “ Train Delay Prediction Systems Using Big Data Analytics” , International Journal of Innovative Research in Computer and Communication Engineering, Vol. 6, Issue 3, March 2018
[16] Yaghini, Masoud & Setayesh Sanai, Maryam & Amin Sadrabady, Hossein., “Passenger Train Delay Classification,” International Journal of Applied Metaheuristic Computing 4. 21-31. 10.4018/jamc.2013010102. (2015)
[17] Zorkany, M & Zaki, Mohamed & Ashour, I & Hisham, Basma. “Online bus arrival time prediction using hybrid neural network and Kalman filter techniques.” International Journal of Modern Engineering Research (IJMER). V3. (2013)
[18] Sternberg, Alice & Soares, Jorge & Carvalho, Diego & Ogasawara, Eduardo. “A Review on Flight Delay Prediction.” (2017)
[19] RailApi, “Indian railway apis,” https://railwayapi.com, 2018
[20] https://runningstatus.in, 2018
[21] Fan, Rong-En & Chang, Kai-Wei & Hsieh, Cho-Jui & Wang, Xiang-Rui & Lin, Chih-Jen. (2008). “LIBLINEAR: a library for large linear classification.” Journal of Machine Learning Research. 9. 1871-1874. 10.1145/1390681.1442794.
[22] T. R. Foundation. R: What is r? [Online]. Available: https://www.rproject.org/about.html
[23] M. Paluszek and S. Thomas, MATLAB Machine Learning. Apress, 2016.
[24] Eibe Frank, Mark A. Hall, and Ian H. Witten (2016). The WEKA Workbench. Online Appendix for "Data Mining: Practical Machine Learning Tools and Techniques", Morgan Kaufmann, Fourth Edition, 2016.
[25] pandas: Python data analysis library. Online, 2012, Available: http://pandas.pydata.org/
[26] Scikit-learn. Scikit-learn: machine learning in python. [Online]. Available: http://scikit-learn.org/
[27] Jitendra Oza et al. “Public Transport Tracking and its Issues,” International Journal of Computer Sciences and Engineering, Vol.5(11), Nov 2017, E-ISSN: 2347-2693
Citation
Mohd Arshad, Muqeem Ahmed, "Prediction of Train Delay in Indian Railways through Machine Learning Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.405-411, 2019.
A Study on Augmented Reality Assisted Navigation App Using Machine Learning and Computer Vision
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.412-415, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.412415
Abstract
Indoor navigation has become as important as outdoor navigation. Navigating in big, unknown indoor environments with static 2D maps is a challenge, especially when time is a critical factor. Here we try to present a solution to this problem through an augmented reality based indoor navigation application to assist people in navigating indoor environments, which runs on mobile devices like smartphones or tablets. The excellent computing capabilities in today’s high-end phones or smartphones in combination with their multiple sensors, such as Global Positioning System (GPS), motion sensors, camera, wireless receivers, will allow us to develop a system more advanced than any previous attempts for indoor navigation. The solution will utilize an indoor image based positioning system that takes advantage of smartphones augmented reality (AR) and inertial tracking. The system will have the capability of delivering continuous 3D positioning and orientation of the mobile device which makes it ideal for any navigational application.
Key-Words / Index Term
Augmented Reality (AR), Global Positioning System (GPS), Indoor Navigation, Technology
References
[1] U. Rehman, and S. Cao, “Augmented Reality-based Indoor Navigation: A Comparative Analysis of Handheld Devices vs. Google Glasses”, In the Proceedings of the 2016 IEEE Conference on Human Machine Systems, India, pp. 47(1), 140–151.
[2] “Feature-based indoor navigation app using Augmented Reality”. Sebastian Kasprzak, Andreas Komninos, Peter Barrie, United Kingdom.
[3] Mehdi Mekni, Andre Lemieux, “Augmented Reality: Applications, Challenges and Future Trends”. In the Proceedings of the Applied Computational Science, University of Minnesota.
[4] “A Review Paper on Augmented Reality”, International Journal of Computer Sciences and Engineering, Volume 6, Issue 5, May 2018.
[5] “Natural markers for augmented reality-based indoor navigation and facility maintenance”. Christian Kotch, Matthias Negas, Markus Konig, 20th August 2014, Germany.
[6] R. Silva, J. C. Oliveira, G. A. Giraldi, “Introduction to Augmented Reality”, In the Proceedings of the National Laboratory of Scientific Computation, Brazil.
[7] “Indoor localization and navigation using smartphones augmented reality and inertial tracking”. Buti Al Delail, Luis Weruaga, M. Jamal Zemerly, UAE.
[8] “HyMoTrack: A Mobile AR Navigation System for Complex Indoor Environments”. Georg Gerstweiler, Emanuel Vonach and Hannes Kaufmann, 24th December, 2015, Austria.
[9] Dree Barclay, Maricar Aliasut, Llandro Ojeda, “Augmented Reality in Location Tracking”, University of Manitoba, Cannada, pp. 4, 2017.
[10] Nehla Ghouaiel , Samir Garbaya , Jean-Marc Cieutat , Jean-Pierre Jessel, “Mobile Augmented Reality in Muesums: Towards Enhancing Visitor’s Learning Experience”, International Journal of Virtual Reality, 2016, pp 21-pp 31.
[11] Sebageniz Jason, Suchithra R, “ Scheduling Reservations of Virtual Machines in Cloud Data Center for Energy Optimization”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.6, pp.16-26, December (2018).
[12] Mutkule Prasad R., “ Interactive Clothing Based on IoT using QR Code and Mobile Application”, International Journal of Scientific Research in Network Security and Communication, Volume-6, Issue-6, December 2018 Research Paper.
Citation
Waheeda Dhokley, Asif Syed, Nitika Tomar, Riya Patil, "A Study on Augmented Reality Assisted Navigation App Using Machine Learning and Computer Vision," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.412-415, 2019.
Interactive 3D Model Construction From House Plans using Augmented Reality
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.416-420, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.416420
Abstract
Augmented Reality is an interactive and real-world environment where the objects in the real-world are augmented by computer-generated perceptual information, sometimes across multiple sensory modalities, including visual, auditory, haptic, and somatosensor. Augmented Reality (AR) is a new interface technology which brings 3D model in the real time environment. To manipulate 3D models in real time environment through the Smartphone`s Vuforia technology is used. Visualization of the model can be done by using HMD (Head Mounted Display). Develop a model which will forecast a dynamic 3D model from 2D house plans. The system assembles 3D models and overlays virtual model on the real 2D Blueprint of the house (Architectural/Hand-drawn). Harris corner detection algorithm is used and Detection of Doors/Windows are done through Template matching algorithm. It is mainly based on Image Processing by using OpenCV library functions.
Key-Words / Index Term
HMD(Head Mounted Display), Computer Vision, OpenCV
References
[1] Y. Shen, S. K. Ong, and A. Y. C. Nee, "Collaborative design in 3D space," p. 29, Aug. 2008. Apr. 16, 2016.
[2] R. Minetto, N. Thome, M. Cord, N. J. Leite, and J. Stolfi, “T-HOG: An effective gradient-based descriptor for single line text regions,” Pattern Recognition (PR). Elsevier, vol. 46, no. 3, pp. 1078 – 1090, 2013..
[3] M. Weber, M. Liwicki, and A. Dengel, “a.SCAtch - A Sketch-Based Retrieval for Architectural Floor Plans,” 12th International Conference on Frontiers of Handwriting Recognition., 2010, pp. 289–294.
[4] G. S. Lluis-Pere de las Heras, Joan Mas and E. Valveny, “Wall Patch-Based Segmentation in Architectural Floorplans,”in 11th International Conference on Document Analysis and Recognition., 2011.
[5] M. Hakkarainen, C. Woodward, K. Rainio. Software Architecture for Mobile Mixed Reality and 4D BIM Interaction, Proc. 25th CIB
W78 Conference, Istanbul, Turkey, Oct 2009, 8 pp.
[6] M. Aittala. Inverse lighting and photorealistic rendering foraugmented reality. The Visual Computer. Vol 26 2010, No. 6-8, pp.669-678.
[7] Y. Shen, S. K. Ong, and A. Y. C. Nee, "Collaborative design in 3Dspace," p. 29, Aug. 2008.
[8] G. Carmelo, L. Delfa, and V. Catania, "Accurate indoor navigation usingSmartphone, Bluetooth low energy and visual tags," jun.11,2016.
Citation
T.Gowrisankari, M.Rahul Raj, A.Kousika, G. Balachandar, "Interactive 3D Model Construction From House Plans using Augmented Reality," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.416-420, 2019.
Cloud Computing Characteristics and Services: A Brief Review
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.421-426, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.421426
Abstract
This study helps organizations and individuals understand how cloud computing can provide them with reliable, customized and cost-effective services in a wide variety of applications. In this paper, we have tried to explore various cloud computing services, applications and characteristics; we give various examples for cloud services delivered by the most common Cloud Service Providers (CSPs) such as Google, Microsoft, and Amazon. We have also discussed cloud computing service models and their benefits.
Key-Words / Index Term
Cloud Computing, Virtualization, Data recovery, E-Governance, Service provider
References
[1] Mell P, Grance T, Others. The NIST definition of cloud computing [Internet]. [cited 18 Sep 2017]. National Institute of Standards and Technology; 2011. Report No.: Special Publication 800–145.
[2] Radu Prodan and Simon Ostermann, “A Survey and Taxonomy of Infrastructure as a Service and Web Hosting Cloud Providers”, 10th IEEE/ACM International Conference on Grid Computing, 2009
[3] http://en.wikipedia.org/wiki/Cloud_computing
[4]http://searchcloudcomputing.techtarget.com/sDefinition/0,,sid201_gci1287881,00.html
[5] K. Chard, S. Caton, O. Rana and K. Bubendorfer, “Social Cloud: Cloud Computing in Social Networks”, 3rd IEEE International Conference on Cloud Computing, Miami, FL, USA, July 5-10,2010.
[6]Cloud Computing vs. Virtualization http://www.learncomputer.com/cloud-computing-vsvirtualization/
[7] Andrew Joint and Edwin Baker, “Knowing the past to understand the present- issues in the contracting for cloud based services”, Computer Law and Security Review 27, pp 407-415, 2011
[8] Vania Goncalves and Pieter Ballon, “Adding value to the network: Mobile operators’ experiments with Software-as-a-Service and Patform-as-a-Service models”, Telematics and Informatics 28, pp 12-21, 2011
[9] NIST, http://www.nist.gov/itl/cloud/index.cfm
[10] GTSI Group, “Cloud Computing - Building a Framework for Successful Transition,” White Paper, GTSI Corporation, 2009.
[11] T. Dillon, C. Wu and E. Chang, “Cloud Computing: Issues and Challenges”, 24th IEEE International Conference on Advanced Information Networking and Applications, 2010.
[12]P. Mell and T. Grance, “The NIST Definition of Cloud Computing” Recommendation of NIST, Special Publication 800-145 2011http://csrc.nist.gov/publications/nistpubs/800-145/SP800-45.pdf
[13]Z. Wang, “Security and Privacy Issues Within Cloud Computing”, IEEE Int. conference on computational and information sciences, Chengdu, China, Oct. 2011.
[14] Ahmed Youssef and Manal Alageel “Security Issues in Cloud Computing”, in the GSTF International Journal on Computing , Vol.1 No. 3, 2011.
[15] Dimitrios Zissis and Dimitrios Lekkas, “Addressing cloud computing security issues”, Future Geberation Computer Systems 28, pp. 583-592, 2012.
[16] Rajnish Choubey, Rajshree Dubey and Joy Bhattacharjee, “ A Survey on Cloud Computing Security, Callenges and Threats”, International Journal on Computer Science and Engineering (IJCSE), vol. 3, No. 3, 2011.
Citation
Aaqib Rashid, Amit Chaturvedi, "Cloud Computing Characteristics and Services: A Brief Review," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.421-426, 2019.